Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Medicine & Health Science
Q:
GDSS software is frequently used to facilitate which of the following activities in systems development?
a. Interviews
b. Questionnaires
c. Observations
d. Joint application development
Q:
All of the following statements are true regarding interviewing for systems development EXCEPT
a. The interview should be 60 minutes or less.
b. Interviews may contain a mixture of structured and unstructured questions.
c. All end-users of an information system must be interviewed.
d. The interview protocol should be field-tested.
Q:
Which of the following is true regarding interview protocol questions?
a. Structured questions are difficult to ask.
b. Structured questions require less interviewing skill than do unstructured questions.
c. Structured questions should be avoided in an interview.
d. Structured question responses take more time to gather than responses to unstructured questions.
Q:
Which of the following is an advantage of using unstructured questions in an interview?
a. Allows for probing
b. Takes little interview time
c. Provides a limited range of responses
d. Allows for easy analysis of responses
Q:
Which of the following is an acronym for computer programs used to design, develop, and maintain information systems?
a. CASE
b. SDLC
c. GSLC
d. ISLC
Q:
In which of the following data dictionary notations would specifics such as data element length and type be located?
a. Label
b. Entry type
c. Description
d. Value/meaning
Q:
All of the following would be considered an entry type in a data dictionary notation EXCEPT
a. Data flow.
b. Data process.
c. Data store.
d. Data element length.
Q:
In a data dictionary notation for a data element, the "label" describes which of the following?
a. The project
b. The data name
c. The data entry type
d. The data value or meaning
Q:
Which of the following best defines the data dictionary?
a. Central repository of information about all system data
b. Graphical representation of data flow
c. Transition tool to show change over time
d. Graphic representation of problem decomposition
Q:
In a data flow diagram, an arrow is used to represent which of the following?
a. External entity
b. Data flow
c. Data store
d. Data process
Q:
In a data flow diagram, a closed rectangle is used to represent which of the following?
a. External entity
b. Data flow
c. Data store
d. Data process
Q:
All of the following are part of the system development life cycle EXCEPT
a. Systems analysis.
b. Systems design.
c. Systems implementation.
d. Systems operation.
Q:
Which of the following is likely to contribute to information system obsolescence:
a. Increase in user expectations.
b. Advancement in technology.
c. Mechanical failure.
d. All of the above.
Q:
The phenomenon of discontinuity of information systems being at different stages in the information life cycle causes stress on which of the following organizational resources:
a. Technical assistance.
b. Time.
c. Equipment.
d. All of the above.
Q:
Criteria for evaluating vendor responses to RFPs should encompass each of the following considerations EXCEPT
a. RFP distribution considerations.
b. Hardware and software considerations.
c. Vendor considerations.
d. Economic considerations.
Q:
The phases of development, growth maturity, and deterioration are generally considered the
a. Information systems life cycle.
b. System development life cycle.
c. General system life cycle.
d. Strategic Plan.
Q:
It is the central repository for all the information in the health care organization's data base.
a. Master Patient Index
b. R-ADT
c. Number Bank
d. Data Dictionary
Q:
Which of the following tools could a HIM director use to distribute to a 460-member physician staff about their interest in natural language processing and computer-assisted coding?
a. Interviews
b. Case studies
c. Questionnaires
d. None of the above
Q:
Virtual communities are an aggregation of individuals or business partners who interact around a shared interest, where the interaction is at least partially supported and/or mediated by technology.
Q:
QR code technology allows for all kinds of documents to contain a QR code and be able to be read without a specialized bar code scanner.
Q:
A business intelligence system could access community data systems and other external systems for its stated purposes with appropriate authorization.
Q:
A business intelligence application is used for the same purpose as a decision support system.
Q:
A good design of a Web page will enable the user to obtain the information in the fewest possible steps.
Q:
Hypertext links on a Web page are usually used to reference materials that are available on a separate Web site.
Q:
Clinical context object workstation (CCOW) is specifically mentioned in the Health Insurance Portability and Accountability Act (HIPAA) Security Rule.
Q:
Frames are required to be in each Web page containing health information.
Q:
A user interface is often designed by both users and nonusers of the application.
Q:
Each wireless network has a service set identifier.
Q:
A syndromic surveillance system would be used in treating a patient in a physician's office.
Q:
The Health Insurance Portability and Accountability Act (HIPAA) Security Rule specifies specific software applications that are required for two-factor authentication.
Q:
Secure socket layer (SSL) is an example of public key/private key encryption.
Q:
The public keys used in encryption are distributed by the U.S. government.
Q:
JAVA compilers are usually found in Web browsers.
Q:
Standard query language (SQL) is designed to enable queries to databases.
Q:
Standard query language (SQL) is a type of database model.
Q:
Voice recognition both records the information being said and understands what is being said.
Q:
Results reporting is the process of scanning documents into a clinical system.
Q:
Information can be input and retrieved by use of a smartphone.
Q:
Communications technology is the connecting medium for local area networks (LANs) and wide area networks (WANs).
Q:
A point-of-care system may include order entry decision support systems.
Q:
A virtual machine is able to be connected directly to the information warehouse.
Q:
A point-of-care health information system includes bedside workstations, biomedical devices, and local area networks (LANs).
Q:
In a database, a row is a data field.
Q:
Explain the differences between a data mart and a data repository.
Q:
A hospital is trying to determine the cause of the recent increase in the average length of stay. Explain why a data mining approach to answering this question might be useful.
Q:
What are the typical five roles defined in role-based access control (RBAC)?
Q:
Provide two examples of what can be read by a biometric device.
Q:
Explain why there are issues with physician licensing in telemedicine.
Q:
What does the term "store-and-forward" refer to in telemedicine?
Q:
Give an example of a type of document that would be found on an organization's Intranet.
Q:
Explain what S-HTTP refers to.
Q:
List three functions that an ADT system can support.
Q:
List one benefit of using an interface engine instead of a point-to-point interface.
Q:
A physician's office wants to install software to process patient claims to each insurer. Because patients have multiple types of insurance, the software will need not only to transmit the claims but also to understand what information needs to be sent to each insurer. Would you choose a two-tier or three-tier architecture for this application? Why?
Q:
List the two components of a two-tier architecture.
Q:
Contrast a decision-support and a business intelligence system.
Q:
Within an object-oriented database, there are two objects-a social worker and a nurse. There is a third object, employee, of which the social worker and nurse are members. What does the concept of "inheritance" refer to in this example?
Q:
What is the hierarchical model effective for?
Q:
Given the relational database model principles, what is the most effective way to store each patient's address?
Q:
List the four popular database models.
Q:
What is one advantage of using thin-clients when upgrading a software application?
Q:
List one difference between thick-client and thin-client computers.
Q:
List one reason why health care information systems have been able to expand in both scope and presence in most health care organizations.
Q:
Define an ERP.
Q:
In the relational model, a patient has two different patient identification numbers from different clinics within a health system. How would the relationship be defined for the patient's social security number and these patient identifiers?
Q:
In what generation language would you find a program generator?
Q:
What is the program called that contains the set of instructions that tells the computer what to do?
Q:
What is the term given to the study of medical computing?
Q:
A repository of electronic information about many patients is called a ____________________.
Q:
An example of a relational database management system in personal computer software is
a. PowerPoint.
b. Word.
c. Access.
d. Excel.
Q:
An industry standard sublanguage, command-driven, designed to manipulate relational databases is known as
a. SQL.
b. HL7.
c. Q&A.
d. R-ADT.
Q:
Which is included in a data model?
a. Data content
b. Data structure
c. Storage method
d. All of the above
Q:
What is the term for a field containing redundant data that links two or more tables in a relational database?
a. Key field
b. Logic field
c. Memo field
d. Note field
Q:
Which of the following would not be an example of an alert found on a CDSS system?
a. "The patient is allergic to this drug."
b. "The patient is receiving a similar drug to this order."
c. "Your password is going to expire in 10 days."
d. "The drug being ordered is on a restricted formulary. Call for approval."
Q:
A wireless network can be secured with the use of
a. Wired equivalent privacy protocol.
b. A firewall.
c. A virtual private network.
d. All of the above.
Q:
An example of malware is
a. An attachment to an e-mail message.
b. A Web site that is collecting personal information without permission of the user.
c. A macro that is operating on a computer without permission of the user.
d. None of the above.
Q:
Each health care provider organization needs a disaster recovery plan for critical information because
a. The plan allows for additional reimbursement by third-party payers.
b. The plan is automatically implemented when a new computer is purchased.
c. The plan will attract more highly skilled IT employees.
d. The plan is required by HIPAA.
Q:
A primary feature that a radio frequency identification device (RFID) tag contains that a bar code does not is that
a. An RFID tag has write-many capabilities.
b. An RFID tag can be printed on labels.
c. An RFID tag number will never be repeated.
d. An RFID tag is less expensive than a bar code.
Q:
Symbology is the term used to describe
a. The abbreviation policy for the health care organization.
b. The font in which a machine-readable code is written.
c. The review of illegible handwriting.
d. None of the above.
Q:
Within a health care organization, in what department would you expect to find discussions about transmission control protocol/Internet protocol (TCP/IP)?
a. Patient accounting
b. Medical records
c. Data communication
d. Software development